Blog Posts Tagged with "Anonymous"

7fef78c47060974e0b8392e305f0daf0

Anonymous, Occupy, Cyber Terrorism, and Jingoistic Rhetoric

February 23, 2012 Added by:Infosec Island Admin

To really have an attack that merits all this hand wringing you would have to have considerable money, time, and effort. Never mind the access that one would need to innumerable systems, and this is not Anonymous even if they made boasts that they could or would do it...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Remote Attack Code for Symantec's pcAnywhere in the Wild

February 23, 2012 Added by:Headlines

"A surprising amount of the core code originates from... 10 years ago with only a few added changes, mainly to accommodate changes in Windows versions. Many individual .exe or other files include an accompanying Word document with a detailed developer description of how it functions.."

Comments  (0)

Ecadf7bc12303bf9d93a73b5ea4a6ace

Don't Be Naïve about Anonymous or the Occupy Movement

February 22, 2012 Added by:Robin Jackson

If you are an information security professional, then I urge you to quit worrying about what conferences you're going to speak at and get serious about shoring up the defenses of every computer system that you are responsible for immediately...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

Anonymous, NSA, Power Grids and False Flags

February 22, 2012 Added by:Infosec Island Admin

Anonymous has never officially made a statement about attacking the power infrastructure at all. Sure, there were some drops of IP addresses in the recent past that they claimed were SCADA systems, but were only for HVAC systems. So where is the NSA getting this?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Planned Anonymous Attack on the Internet Likely to Fail

February 20, 2012 Added by:Headlines

"The attack is no longer practical. It's such a common idea that Wikipedia has a page devoted to it. For something so obvious, defenders have spent considerable time devising solutions. There are many reasons why such an attack won't cause a global blackout..."

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Anonymous Now Interested in the Great Firewall of China

February 17, 2012 Added by:Pierluigi Paganini

Why have they not targeted China before? Hypothetically, the structure of Anonymous could have been infiltrated and directed against the Chinese as part of a strategy defined by the West, or perhaps someone is using the name Anonymous to conduct undercover operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Hacks and Defaces FTC Websites

February 17, 2012 Added by:Headlines

The rogue hacktivist collective Anonymous has claimed credit for hacking and defacing several Federal Trade commission (FTC) websites in protest of the US government's support of the Anti-Counterfeiting Trade Agreement (ACTA)...

Comments  (0)

296634767383f056e82787fcb3b94864

Reflections on Suits and Spooks DC

February 16, 2012 Added by:Jeffrey Carr

We should re-assess which attacks should be investigated and which should be let go. The FBI and US-CERT are overwhelmed with tracking everything from probes against government networks to DDoS attacks to targeted attacks against the Defense Industrial Base...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Jihadi Information Warfare: The Next Wave

February 14, 2012 Added by:Infosec Island Admin

There have been tutorials on SQLi and Metasploit online for a long time, but only recently have we seen them translated into Arabic and placed on the technical forums. This means that even the low end of the technically capable Jihadist's can now boot up these tools hack a site…

Comments  (0)

68b48711426f3b082ab24e5746a66b36

FBI Bitten by Operational Security

February 13, 2012 Added by:Fergal Glynn

Employees forward confidential calendar events and messages to personal calendars and personal email accounts. This may make their jobs easier but it can put their companies at risk. A recent security incident involving the FBI can teach us something about corporate security...

Comments  (0)

68b48711426f3b082ab24e5746a66b36

Security Weekly News Roundup: Tunnel Vision

February 11, 2012 Added by:Fergal Glynn

As security professionals do we all just suffer from “security tunnel vision” or is something major shifting in our industry? Is it all just related to the significant rise in hacktivism or the 24-hour news cycle requiring that every little thing become a news story?

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Did the 2006 Symantec Breach Expose RSA's SecurID?

February 10, 2012 Added by:Kevin McAleavey

The Symantec leak could pose a risk to RSA's SecurID. Examination of the source code for PCAnywhere turned up something disturbing - numerous header files and several libraries belonging to RSA, and SecurID code is part of the exposed PCAnywhere product source code...

Comments  (23)

7fef78c47060974e0b8392e305f0daf0

Cyber Preparedness: Paper Tigers... Aren’t We All?

February 09, 2012 Added by:Infosec Island Admin

China, Russia, Israel etc etc are all key players in the espionage world which now includes the 5th battlespace of information warfare carried out on the internet and within computer networks. To think anything else because someone asked them just how prepared “they” were for “cyberwar” is just appallingly stupid...

Comments  (0)

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Hacks, Breaches, and Disclosures

February 08, 2012 Added by:Cyber Defense Weekly

"Us law firms have been penetrated both here and abroad. Firms with offices in China and Russia are particularly vulnerable, because the foreign security services are likely to own the people who handle the the firms' physical and electronic security..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Symantec Source Code Leak: The Real Elephant in the Room

February 08, 2012 Added by:Infosec Island Admin

Everyone is all over the fact that the Symantec code had been hacked back in 2006 right? I have not seen anything about the real elephant in the room. Where has the code been lo’ these many years? Who had it? Who hacked Symantec in the first place? Anyone? Anyone? Bueller?

Comments  (0)

6d117b57d55f63febe392e40a478011f

Update: Alleged Source Code Thieves Attempt to Extort Symantec

February 06, 2012 Added by:Anthony M. Freed

Anonymous-aligned hacker YamaTough, the spokesperson for the hacktivist group “The Lords of Dharmaraja”, falsely accused Symantec of attempting to bribe the group in order to prevent the release of source code for the company's PCanywhere product, among others...

Comments  (7)

Page « < 2 - 3 - 4 - 5 - 6 > »